Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer them ALL for me to understand 11.What technology has made trojans easy to distribute? Choose the best answer. Choice a EXE wrappers Choice

Please answer them ALL for me to understand

11.What technology has made trojans easy to distribute? Choose the best answer.

Choice a

EXE wrappers

Choice b

Digitally Signed Software

Choice c

Assembly language

Choice d

Personal firewall software

12. A disadvantage of single sign-on is:

Choice a

Repeated use of the same passwords.

Choice b

Consistent time-out enforcement across platforms.

Choice c

Forcing password changes on all subordinate systems.

Choice d

A compromised password exposes all authorized resources.

13. An IPsec security association includes ___

Choice a

the Diffie-Hellman key exchange crypto variable

Choice b

the IKE

Choice c

IP address of the distant end

Choice d

IP address of the originating computer

14. Which of the following tools would be most effective for sniffing RDP (Remote Desktop Connection) logins? (choose one.)

Choice a

Wireshark

Choice b

dsniff

Choice c

macof

Choice d

Cain and Abel

15. What is the purpose of a hash function?

Choice a

To provide integrity

Choice b

To create a value that cannot be repudiated by its sender

Choice c

To obfuscate a data segment such that it cannot be deciphered without a key

Choice d

To preserve a copy of all of the information from the original data segment

16. Which of the following is true regarding varying skill sets with regards to technical staff?

Choice a

Valuable employees should be focused on specialized functions and skill sets.

Choice b

The organization should ensure employees have overlapping skills when possible to prevent single points of failure

Choice c

Managerial skills (soft skills) should be prioritized over technical skills.

Choice d

Valuable IT employees need to possess the skill sets for any job in IT.

17. What sniffer program is capable of reconstructing associated TCP packets into a session showing application layer data from the client to the server and vice-versa?

Choice a

ARPwatch

Choice b

Packetyzer

Choice c

Etherape

Choice d

Wireshark

18. Methodology is one of the most important factors of success while doing a security test. Which of the following steps would represent the first step that is done either by a malicious cracker or a penetration tester?

Choice a

Scanning

Choice b

Enumeration

Choice c

Footprinting

Choice d

19. Which of the following types of attacks is the hardest to detect and prevent?

Choice a

Viruses that are hidden in exe's and attached to email

Choice b

DDoS attacks against web services

Choice c

Exploits against web applications such as SQL injection and buffer overflows

Choice d

Web pages with malicious executable content

20. Which of these terms is MOST closely related to integrity?

Choice a

Trustworthiness

Choice b

Auditability

Choice c

Reliability

Choice d

Need-to-know

21. A digital signature does NOT ___

Choice a

use asymmetric keys.

Choice b

provide non-repudiation of origin.

Choice c

provide confidentiality

Choice d

provide proof of integrity.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Horse Betting The Road To Absolute Horse Racing 2

Authors: NAKAGAWA,YUKIO

1st Edition

B0CFZN219G, 979-8856410593

More Books

Students also viewed these Databases questions

Question

5. Discuss the key components of behavior modeling training.

Answered: 1 week ago

Question

4. Develop a self-directed learning module.

Answered: 1 week ago

Question

2. Provide recommendations for effective on-the-job training.

Answered: 1 week ago